2

cyber attack

Most breach post-mortems focus on the granular reasons a hack took place but don’t explore the systemic cultural issues within an organization that allowed the breach to happen, according to a panel of security experts at last month’s SecTOR conference in Toronto.

Web application attacks are becoming more popular — and they can be significantly more difficult to detect. Along with volumetric attacks, they are contributing to a relatively new class of attack, known as ‘dark’ or ‘smokescreen’ DDoS. Here’s what to do about it.